Massachusetts Institute of Technology

Displaying 1-40 of 390 results

Wearable computing moves computation from the desktop to the user. The authors are forming a community of networked wearable computer users to explore, over a long period, the augmented realities that these systems can provide. By adapting its behavior to the user's changing environment, a body-worn computer can assist the...

Nine call center employees wore a skin conductance sensor on the wrist for a week at work and reported stress levels of each call. Although everyone had the same job profile, they found large differences in how individuals reported stress levels, with similarity from day-to-day within the same participant, but...

In this paper, the authors present a new Affective-Behavioral-Cognitive (ABC) framework to measure the usual cognitive self-report information and behavioral information, together with affective information while a customer makes repeated selections in a random-outcome two-option decision task to obtain their preferred product. The affective information consists of human-labeled facial expression...

The authors consider an opportunistic communication system in which a transmitter selects one of multiple channels over which to schedule a transmission, based on partial knowledge of the network state. They characterize a fundamental limit on the rate that channel state information must be conveyed to the transmitter in order...

Cloud computing offers numerous advantages to businesses and individuals by enabling them to store data and run websites on remote computers rather than ones they own. But many hesitate to use the technology for fear of what might happen if a cloud provider's systems aren't secured properly or break down.

In this webcast, the presenter going to explain about the steps that every organization need to know about the insider threat. The presenter will discuss about the components and considerations in building an insider threat program.

The authors consider a multi-channel communication system in which a transmitter has access to two channels, but does not know the state of either channel. They model the channel state using an ON/OFF Markovian model, and allow the transmitter to probe one of the channels at predetermined probing intervals to...

COPE is a new architecture for unicasts in wireless mesh networks that employs opportunistic network coding to improve total throughput. Katti et al. showed through experiments that this system significantly improves the throughput of wireless networks with UDP traffic, and several attempts have been made to analyze the COPE performance....

In this paper, the authors evaluate the performance of Random Linear Network Coding (RLNC) in low data rate indoor sensor applications operating in the ISM frequency band. They also investigate the results of its synergy with Forward Error Correction (FEC) codes at the PHY-layer in a Joint Channel-Network Coding (JCNC)...

Cloud computing is a major emerging technology that is significantly changing industrial computing paradigms and business practices. However, security and privacy concerns have arisen as obstacles to widespread adoption of clouds by users. While much cloud security research focuses on enforcing standard access control policies typical of centralized systems, such...

For authentication and authorization in legal matter humans are recognized by their Signature. Every human being has their own writing style and hence their signature is used in the financial domain for identity verification. So it is necessary to develop a technique which is efficient in verifying the Handwritten Signature...

The authors investigate the maximal achievable rate for a given block-length and error probability over quasi-static Single-Input Multiple-Output (SIMO) fading channels. Under mild conditions on the channel gains, it is shown that the channel dispersion is zero regardless of whether the fading realizations are available at the transmitter and/or the...

Existing crypto-based Private Information Retrieval (PIR) schemes are either limited in the set of queries they can per-form, or have prohibitively large performance overheads in making query comparisons. On the other hand, most previous tamper-resistant hardware schemes can support more general queries and have lower performance overheads, but need to...

As the number of on-chip cores increases, scalable on-chip topologies such as meshes inevitably add multiple hops in each network traversal. The best, the authors can do right now is to design 1-cycle routers, such that the low-load network latency between a source and destination is equal to the number...

In this Webcast, the presenter going explain about the topic protection which is like fault tolerance recover ability one of these properties of systems building secure and protective system has implication for entire design of systems. The presenter will also explain about the set of issues related to security management.

Technological growth can only sustain a company's growth and evolution so far in this global market. Even a start up or early stage company must consider change transformation in order to reach the break points and/or next levels of growth. The level of consciousness an organization has about change will...

Are there any formulas for simultaneously achieving technological innovation and steady growth on a global basis? In this webcast, the presenter describes companies must continuously access and leverage technical resources, which means they must not \"Just think globally but locate globally.\"

In this webcast, the presenter going to discuss about the enterprise behavior. The presenter will lead the user to know how to understand and model the enterprise behavior by using a hybrid simulation approach.

In this webcast the presenter going to explain about the vision of cloud. Cloud computing which will allow the wider range of computing possibilities. The presenter also going to discuss about the different kinds of ways to transform personal computing.

In this webcast, the presenter going to explain about vulnerability for competitive advantage. An organization can be taught to know things faster, by deploying better detection methods, including statistical process control; and creating layers of defense.

E-commerce has come a long way since the early days of eBay, Amazon, and Yahoo. Users are constantly being provided with services and platforms that are more specialized and more in tune with their needs and tastes. And retailers are constantly seeking ways to make their offerings more targeted.

In this webcast, the presenter explains why startups are not small versions of large companies, and why they require processes and guidelines all their own. The presenter also describes the detailed customer development process for building scalable startups.

The business model canvas, a conceptual management tool to visualize, discuss, and invent business models, has known a phenomenal success around the world. In this webcast, the presenter going to explain the usability of management concepts and how this will change the way they approach business.

Soon after a business plan is hatched and long before manufacturing ramps up, start-ups begin to apply systems design principles to create their breakthrough products. It turns out that systems engineering, an art developed and perfected in large organizations, applies just as well to small entrepreneurial ventures.

The small business conundrum this webcast focused on the essential components and growth opportunities for manufacturing and innovation. Small businesses, in particular, feel they must innovate new products to grow, but can be handicapped by little access to capital.

In this webcast, the presenter going to explain about how to create a B2B content marketing strategy? Content marketing which is an approach that involves creating, distributing and exchanging information in order to attract, retain and engage with the group of intended audience.

In this webcast, the presenter going to explain about the cloud computing which is one of the emerging technology. The presenter explains a startup that is developing a database designed to cope with the idiosyncrasies of cloud computing.

In this webcast, the presenter will discuss about the software system architecture using cloud computing. The presenter describes about the cost of change decreases when software applications are put in the cloud.

In this webcast, the presenter discusses the following key concepts in IT risk management: how IT managers can improve alignment and understanding, both in IT and the business, by discussing IT risk considerations in terms of key enterprise risks; how organizations build effective IT risk management capability through the disciplines...

Traditionally, supply chain and sales have been managed relatively independently, despite the critical impact that each has on the other. Systems thinking provide the key to linking these two critical business functions. In this webcast, the presenter will explain the central importance of this critical metric; describe how to measure...

Web Engagement Management (WEM) is a concept to bridge business processes and technology to manage content, conversations, and messaging to enhance the user digital presence. In this webcast, the presenter will discuss how to use WEM to make decisions to position their organization for the rapidly changing world of the...

In this webcast, the presenter going to explain about Code in the Air a system that lowers the barrier for programming and executing tasking applications. CITA includes an activity layer which makes it easy for developers to express conditions that reference high-level activities.

In this webcast, the presenter explains about the importance of fostering a corporate \"Stretch culture\" that supports taking big steps in culture change and business process improvement while maintaining a sense of customer satisfaction.

In this webcast, the presenter going to explain the ways that Information Technology (IT) affects businesses and business as a whole. The presenter research investigates how IT changes the way companies perform, organize themselves, and compete.

The education sector in India offers enormous opportunity to employ entrepreneurial business models to create a lasting and positive impact. In this webcast, the presenter shares his experiences as an entrepreneur building a sustainable venture in a domain that has only recently started accepting the role of private enterprise.

Drupal is an amazingly flexible framework, with literally thousands of contributed modules to extend and transform its functionality. In this webcast, the presenter will explore that nexus between their business, design and technology, and cover some of the strategies they can use to go beyond the basics.

In this webcast, the presenter will focus on how cloud computing has already penetrated the enterprise, best practices in rolling out cloud technologies, and how small and large vendors can address new opportunities in this sector.

The presenter TR10 innovator who is trying to make life easier for programmers by creating tools that can take over data management within a cloud. The presenter going to explain about the potential of cloud computing and how his approach will unlock that potential.

In this webcast, the presenter explains about the cloud security which is one of the evolving technology to protect data, application and infrastructure problems. The presenter also describes the potential benefits, and security challenges, of cloud computing.

Companies from aerospace to white goods use platforming strategies to deliver more variety to their customers while saving internally by sharing parts and overhead. However, many firms fail to earn a return on their investment in platforms. In this webcast, the presenter will explore whether such failures are the result...

Ted Kelly walks a Sloan audience through the process of turning around a failing company. His formula? Develop two key things: a fact based analytical organization and great management teams that value people.

In 13 Bankers Johnson, a former chief economist for the International Monetary Fund and co-author James Kwak cite historical precedents offers financial analysis to conclude that a second financial shock is inevitable unless the financial and political stranglehold held on Washington by the nation's biggest banks is broken.

Merton starts with the breakthrough work that earned him his laurels and which has recently stirred up controversy: derivative& there are "No mysteries" to these financial instruments, insists Merton they are neither complex nor threatening Derivatives are "Nothing more than insurance."

In thirty years. S. D. Shibulal has seen his share of economic crises, but in thinking hard about the role of crises in the future for today's students he predicts: they will occur more frequently and will be less predictable, longer lasting and more costly.

The "Chief inspired protagonist" of one of the nation's oldest and most successful green manufacturers apologizes for delivering a talk "More depressing than expected." While discussing the challenges facing businesses attempting to transition to a more just and sustainable economy, Jeffrey Hollender enumerates the many reasons he's feeling bleak these...

The hacking of emails from the University of East Anglia's Climate Research Unit in November rocked the world of climate change science, energized global warming skeptics and threatened to derail policy negotiations at Copenhagen, these panelists, who differ on the scientific implications of the released emails generally agree that the...

Transportation systems, as we know them today, will simply not sustain the worlds' growing population. John Sterman says it is self-evident that the current transportation model simply will not scale. But, since the Gross World Product (GWP) is growing at 3.2% annually, and doubles every twenty years, the current model...

Few Companies have endured such hardship or risen to such heights in a brief span of time as Akamai Technologies. Paul Sagan tells how he became the CEO of this young firm and helped it survive and then flourish despite "Unimaginable adversity".

Suppose you could leapfrog 100 years of experience in the automotive industry and begin a new manufacturing epoch the strategic change you would make is to lightweight the vehicle, observes Charles Fine although steel has been the material of choice for many automotive components since the dawn of the automotive...

Accommodating couples has been a longstanding issue in the design of centralized labor market clearinghouses for doctors and psychologists, because couples view pairs of jobs as complements. A stable matching may not exist when couples are present. The authors find conditions under which a stable matching exists with high probability...

This paper investigates within a two-country, general equilibrium, incomplete-markets model that focuses on the importance of idiosyncratic entrepreneurial risk - a risk that introduces, not only a precautionary motive for saving, but also a wedge between the interest rate and the marginal product of capital. The contribution is then to...

Growing import exposure spurs a substantial increase in transfer payments to individuals and households in the form of unemployment insurance benefits, disability benefits, income support payments, and in-kind medical benefits. These transfer payments are two orders of magnitude larger than the corresponding rise in Trade Adjustment Assistance benefits. Nevertheless, transfers...

A central organizing framework of the voluminous recent literature studying changes in the returns to skills and the evolution of earnings inequality is what the authors refer to as the canonical model, which elegantly and powerfully operationalizes the supply and demand for skills by assuming two distinct skill groups that...

The authors offer a unified explanation and empirical analysis of the polarization of U.S. employment and wages between 1980 and 2005, and the concurrent growth of low skill service occupations. They attribute polarization to the interaction between consumer preferences, which favor variety over specialization, and the falling cost of automating...

Industrial relations are in trouble. It is in trouble both as a set of institutions and practices, linked to trade unions and collective bargaining and as a scholarly endeavor. The title of talk here, which the author was obliged to provide long in advance, is essentially a place holder for...

This paper reports an experiment in 640 Indonesian villages that investigated three approaches to targeting the poor: Proxy-Means Tests (PMT), where a census of assets is used to predict consumption; community targeting, where villagers rank everyone from richest to poorest; and a hybrid. Defining poverty based on PPP$2 per-capita consumption,...

The authors consider a router on the Internet analyzing the statistical properties of a TCP/IP packet stream. A fundamental difficulty with measuring traffic behavior on the Internet is that there is simply too much data to be recorded for later analysis, on the order of gigabytes a second. As a...

Emerging practical schemes indicate that algebraic mixing of different packets by means of random linear network coding can increase the throughput and robustness of streaming services over wireless networks. However, concerns with the security of wireless video, in particular when only some of the users are entitled to the highest...

The lean enterprise system, total quality management, six sigma, theory of constraints, agile manufacturing, and business process reengineering have been introduced as universally applicable best methods to improve the performance of enterprise operations through continuous process improvement and systemic planned enterprise change. Generally speaking, they represent practice-based, rather than theory-grounded,...

As a company grows, more and more effort is needed to control and coordinate operations. Typically, this is accomplished through an evolving collection of systems and processes, such as an Enterprise Resource Planning (ERP) system, but such systems also influence how a company does business, reviews performance, and communicate results....

In this paper the authors develop an approach to dynamic pricing that combines ideas from data-driven and robust optimization to address the uncertain and dynamic aspects of the problem. In this setting, a firm offers multiple products to be sold over a fixed discrete time horizon. Each product sold consumes...

In this paper, the author explores malware detection using a combination of virtualization- and storage-based intrusion detection techniques. By monitoring disk activity of a virtual machine and correlating that activity to knowledge of the filesystem structure on the virtual machine's disk, an intrusion detection system can react to file changes...

Industrial relations are in trouble. It is in trouble both as a set of institutions and practices, linked to trade unions and collective bargaining and as a scholarly endeavor. The title of talk here, which the author was obliged to provide long in advance, is essentially a place holder for...

Over the course of the last thirty years, government policy has been increasingly dominated by neoclassical economic thought and neoliberal public policies. This has been especially true in the United States, but the trends are evident in one way or another in every part of the world. They reflect in...

With the increasing interconnection of computer networks and sophistication of cyber attacks, it is important to understand the dynamics of such situations, especially in regards to cyber international relations. The Explorations in Cyber International Relations (ECIR) Data Dashboard Project is an initiative to gather worldwide cyber security data publicly provided...

In a webcast the authors offers a bounty of visual and aural pleasures, a museum curator and two artists describe how their work "Dissolves boundaries," in the words of moderator, often "Leading to new frontiers."

Two speakers steeped in the ongoing crisis of the Middle East describe abominable conditions for Palestinians living inside Gaza, which has been blockaded by Israel since 2007. They demand urgent action for civilian victims, and condemn both the Israeli and U.S. governments for pursuing policies of "Genocide."

The economists, MIT PhDs all, ponder what remains in the macroeconomist's toolkit to pull the U.S., and much of the developed world, out of recession. They discuss aspects of fiscal and monetary policy that may prove useful in spurring recovery, as well as the complicating matter of politics.

This webcast first looks inward, at the evolution of macroeconomics in the past century, and the emergence of microeconomic foundations in macroeconomics, then shifts outward, to the application of economic analysis to such issues as structural unemployment, the ongoing U.S. recession, and the best ways to help developing nations.

The astonishing contributions MIT has made to the world of economics emerged from "A melting pot of analytical tools and mathematical methods, mixed with a healthy interest in real world questions, grounded in real world problems," says the moderator, crystallizing many of the themes of the symposium, and its inaugural...

Although we are still far from the moment of singularity, or even Star Wars 'Droids, we can anticipate robot colleagues in the near future, believes by the author. The author is developing 'Situationally aware' machines to help out humans in those "Unstructured environments?where we live, work and recreate."

Don't expect to glean any market tips or trading secrets from the author, who steadfastly refuses to disclose the method behind his remarkable record in investing. Instead, listen to this mathematician, hedge fund manager and philanthropist sum up a remarkably varied and rich career, and offer some "Guiding principles" distilled...

What's a journalist to do when a major story must be coaxed reluctantly into public view, or emerges on what seems like a geological time scale? These panelists discuss how to approach slowly evolving but urgent stories at a time when news coverage has shifted inexorably from print and its...

The presenter finds it difficult to witness the calamitous decline of Spain, a nation he led to robust economic health as prime minister from 1996 to 2004. The gains during his administration have vanished following the international financial crisis. But the economic misfortunes of Spain and other European nations are...

If the prospect of aging and infirmity seems remote, you could use some time with AGNES (Age Gain Now Empathy System), a wearable apparatus that approximates "What it feels like to be a 75-year-old woman."

The author shows how useful a varied background in math, political science and business can be, as he dissects the complexities and recent crisis of the U.S. financial system. In a lecture that distills many of the arguments of his recent film, Inside Job, the author conveys dispassionately yet persuasively...

Reports of the demise of the humanities are exaggerated, suggest these panelists, but there may be reason to fear its loss of relevance. Three scholars whose work touches a variety of disciplines and with wide knowledge of the worlds of academia and publishing ponder the meaning and mission of the...

The Gulf Oil spill hurt many individuals and businesses, and there is broad agreement that they deserve compensation. But working out the nuances of damage payment is no simple matter, as the presenter describes in conversation with an MIT Museum audience.

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?